Stays abreast of competitive landscape and emerging technologies to best position Comcast Business Services in the marketplace.. Develops sales territory, including cultivation of local partnerships and organizational affiliations.. Actively generates new leads with targeted businesses through various prospecting activities, including cold calling, canvassing, customer referrals and partner relationships.. Demonstrates some knowledge of Network Design, MAN technologies & designs including DSx, OC-x, WDM, Ethernet, Internet Technologies, Functionality & Services, Voice Network Technologies (including VoIP), Data Networking Technologies, Functionality & Services (LAN, MAN, WAN, VPN), Networking Protocols (with an emphasis on Layers 1,2, & 3), Customer Premise Equipment (voice & data), Business Continuity/Disaster Recovery concepts and E-rate Contracting Processes and Procedures.. Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus.
Threat Analysis: Conducting threat intelligence analysis to identify potential threats, vulnerabilities, and risks to the organization’s IT infrastructure.. Security Monitoring: Overseeing the use of security information and event management (SIEM) systems and other monitoring tools to ensure continuous surveillance of network and system activities.. Cybersecurity Expertise: In-depth knowledge of cybersecurity principles, practices, and technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus solutions.. Senior-Level Experience: Extensive experience in cybersecurity, with a focus on cyber operations, threat analysis, and incident response.. Certifications: Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Security Essentials (GSEC) would be beneficial.
The Director of Security Operations is a hands-on technical and leadership role responsible for managing and enhancing the firm's security operations, including SIEM, incident response, threat detection, data leakage prevention, and vulnerability management.. Provide strategic leadership and tactical execution of security operations, ensuring the effectiveness of monitoring, incident response, threat detection, and vulnerability management.. Define and track key performance indicators (KPIs) for incident response, vulnerability management, threat intelligence to measure and drive security improvements.. Hands-on experience with cloud security, identity & access management tools, and vulnerability management solutions.. Industry-recognized certifications such as CISSP, CISM, GIAC, or CCSP.
Sr. Sales Solutions Engineer, AMER Strategic (West) Get to know Okta Okta is The World’s Identity Company. As a Senior Solutions Engineer at Okta, you will hone each of these skills by advising a diverse set of Fortune 500 customers on what is possible using Okta’s Identity Platform. A strong understanding of Zero Trust Architecture and core security concerns within a typical application (password hashing, SSL/TLS, encryption at rest, XSS, XSRF) Experience with cloud platforms: AWS, Azure, GCP. You are an elite communicator Can identify, map, and manage multiple personas: IT admins, CISOs, architects, procurement, and legal. Your actual OTE, which is inclusive of base salary and incentive compensation, will depend on factors such as your skills, qualifications, experience, and work location. Amazing Benefits Making Social Impact Developing Talent and Fostering Connection + Community at Okta Okta cultivates a dynamic work environment, providing the best tools, technology and benefits to empower our employees to work productively in a setting that best and uniquely suits their needs.
We work with thousands of companies like Venmo, SoFi, several of the Fortune 500, and many of the largest banks to make it easy for people to connect their financial accounts to the apps and services they want to use.. This team is responsible for secure data storage and loss prevention, key management, identity platform, internal authentication systems (employee, device, and service authentication), internal permission management, and access control.. The team also owns several critical services such as Key Management System, Secure Token Service, Sensitive Information Store, Zero Trust Access Gateway, Internal Permissions Dashboard, Internal Authorization Service, and the Vulnerability Management platform.. Leading a skilled software engineering team to deliver on increasingly impactful and ambitious objectives across many security domains, including: Zero Trust, Data Security, Identity and Access Management, Data Loss Prevention, Vulnerability Management, and Supply Chain Security and Integrity.. End-to-end ownership of comprehensive security controls that scale across Plaid's microservices and data platforms and enable efficient and secure product delivery.
Piper Companies is seeking a Network Security Consultant (Strata) to join a premier cybersecurity organization.. Collaborate with customer's security & network teams to build confidence across the business units impacted by the change to Palo Alto Networks. 5 years of experience with network/security solutions and technologies (BGP, SD-WAN concepts, VXLAN, general routing and switching). High level of experience with Panorama and log collectors. Detailed technical experience in the installation, configuration, and operation of high-end firewall appliances, ideally Palo Alto Networks products
10+ years of proven experience in red team operations, penetration testing, and vulnerability assessment. Proficiency with red team tools (e.g., Cobalt Strike, Metasploit, BloodHound, etc.). Proficiency with developing and executing test plans, scripts, and procedures for red team operations. Working knowledge of regulatory and industry security standards (e.g. GDPR, HIPAA, PCI DSS, SOX, NIST, DORA and GLBA). Relevant certifications (e.g., OSCP, CRTO, CEH, CISSP) are a plus
The Manager of Cybersecurity and IT Governance is responsible for overseeing and coordinating the organization's efforts to protect its information assets from cyber threats and ensure compliance with relevant laws and regulations. Additionally, they communicate and collaborate with various internal and external stakeholders, such as senior management, IT staff, vendors, customers, and regulators, to provide guidance, support, and reporting on cybersecurity and IT governance matters. Relevant certifications such as: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), CompTIA Security+, Certified Information Security Manager (CISM), and/or Certified Information Systems Auditor (CISA).. At least five (5) years of demonstrated proficiency in various cybersecurity domains such as risk management, incident response, cloud security, cybersecurity data analysis, and policy development. IT Governance, Risk, and Compliance: Working with IT and security teams to understand the scope of your cybersecurity framework and document its strengths and limitations.
Whether a customer wants to grow their business, buy a home, or feel confident in their retirement plan, they have a partner in Ameris Bank. We serve customers in our locations across the Southeast, Mid-Atlantic and nationwide through our extensive digital offerings and mobile app.. This role oversees a multidisciplinary team responsible for threat intelligence, countermeasures, security alerting and monitoring, incident response, and digital forensics.. Strong knowledge of threat intelligence frameworks (e.g., MITRE ATT&CK, Diamond Model, Kill Chain).. 10+ years of experience in cybersecurity with a focus on threat intelligence, incident response, and digital forensics required.. GIAC certifications such as GCFA, GREM, or GCIH certifications preferred.
Our client is a well-funded, market leader in deep and dark web cyber threat intelligence.. The advanced cyber threat intelligence platform automates all phases of the intelligence cycle, providing organizations with unparalleled information and actionable insights to protect their assets in the ever evolving cyber threatscape.. As a Sales Engineer, you will work closely with the commercial team in pre-sales situations to solve challenging problems for our clients.. ● 3-5 years of demonstrated success as pre-sales engineer. ● Work in tandem with sales to support pre-sales opportunities, as well as post-sales
This role is based in Salt Lake City, UT and cannot be fully remote.. Conduct preliminary forensic investigations as requestedEngage in threat hunting activities.. Support the Security Operations Center (SOC) passive monitoring program, including North American remediation efforts and exception management as neededAugment annual third-party testing with ad-hoc internal red team activities as directed. Relevant certifications such as CISSP, CEH, OSCP, or similar are highly desirable.. Beware of individuals reaching out using general phone numbers and non-bioMerieux email domains (i.e. Hotmail.com, Gmail.com, Yahoo.com, etc
Information Technology also conducts incident response, threat management, vulnerability scanning, virus management and intrusion detection and completes risk assessments.. Industry-specific certifications (CISSP, CCSP, AWS Certified Security - Specialty). Develops cloud security strategies aligned with NIST Cloud Security Technical Guide, AWS Well-Architected Framework, and Azure Security Center. Designs cloud security architectures that integrate with existing on-premises infrastructure and meet regulatory requirements (HIPAA, PCI-DSS, GDPR). Provides expert-level guidance on cloud security best practices, threat mitigation strategies, and incident response procedures
A well-established law firm is looking for an associate with at least 2 years of privacy and cybersecurity experience to join our team in any of our U.S. offices. The ideal candidate should have expertise in advising on cybersecurity compliance, counseling, and incident response, along with a good understanding of U.S. state, federal, and international privacy regulations (e.g., CCPA, COPPA, GDPR, GLBA, HIPAA, TCPA). CIPP or other relevant industry certification is a plus. JD from an ABapproved law school with excellent academic credentials. Interested applicants should submit a resume, law school transcript, and cover letter.
· Leverage threat intelligence to proactively defend against potential attacks.. · Mentor junior staff and ensure quality of technical support and contractual deliverables This position is on-site with our customer in Washington, DC or Clarksburg, WV. This position requires an active Top Secret clearance and the ability to successfully pass a polygraph and obtain SCI accesses.. Must have expertise in using security information and event management (SIEM) tools, including configuration, tuning, and optimization for real-time monitoring and incident response.. GIAC Certified Incident Handler (GCIH). GIAC Certified Forensic Analyst (GCFA)
The Cybersecurity Operations Engineer will report to the Senior Manager, Cybersecurity Operations under the direction of the Chief Information Security Officer (CISO).. Strong knowledge of information security principles, technologies, and best practices, including risk management, vulnerability management, incident response, and security operations. Experience implementing and maintaining security tools; EDR/XDR, SIEM, Vulnerability Management, Privileged Access Management, Privileged Remote Access. Experience with regulatory compliance frameworks (e.g., GDPR, HIPAA, SOX) and industry standards (e.g., NIST, CMMC, ISO ). Cybersecurity certifications, such as CASP+, GSE, CISSP
Our internationally acclaimed team of digital threat experts and thought leaders work at the cutting-edge of threat detection, continually scanning the horizon for next-generation risks.. PGI has extensive experience delivering international projects across cyber skills and workforce development, women in cyber, cybersecurity training, cyber maturity and vulnerability assessments, cybersecurity for Critical National Infrastructure (CNI), cyber threat intelligence, digital investigations/OSINT analysis, and geopolitical intelligence.. Researchers specialising in cybersecurity in specific areas/topics such as election integrity, CNI, workforce development, and women in cyber. OSINT/digital investigation trainers. Digital democracy and digital human rights advisors
The Identity and Access Management (IAM) Administrator is a practitioner who ensures efficient, seamless, and secure access to business resources.. The Administrator supports the Senior IAM Engineer Manager in evaluating, improving, and optimizing the company’s IAM security posture.. Hands-on experience with, but not limited to, Active Directory, Okta, Entra ID (Azure AD), CyberArk, or similar technologies. The ideal candidate should have 1 to 2 years of practical experience with implementing, maintaining, and troubleshooting issues with CyberArk or a similar PAM solution. Understand LDAP, RADIUS, SAML, IdP/STS, OAuth2, OpenID Connect, SSO, MFA, SSPR, PAM/PIM, and emerging IAM technologies
SCHIE delivers the core infrastructure and foundational technologies for Microsoft's over 200 online businesses including Bing, MSN, Office 365, Xbox Live, Skype, OneDrive, and the Microsoft Azure platform globally with our server and data center infrastructure, security and compliance, operations, globalization, and manageability solutions.. We are looking for a Senior C loud Security Engineer who will tackle interesting security challenges impacting hybrid cloud systems around the globe in collaboration with a dedicated group of IS&T subject matter experts embedded within the Microsoft Silicon engineering organization.. Certification in one or more of the following technologies: Microsoft Cybersecurity Architect, Microsoft Security Operations Analyst Associate, Microsoft Azure Security Engineer, Google Professional Cloud Security Engineer, AWS Certified Security Specialty, CCSP, CISSP, CISA, CISM.. Analyze security controls including Azure Firewall, Network Security Groups, Azure Sentinel, Microsoft Defender ATP, Access Control Lists, Active Directory Domain Services, and Azure Active Directory among others.. Perform hands-on configuration activities in areas such as Identity & Access Management, Azure Firewall, Network Security Groups, Azure Sentinel, Microsoft Defender ATP, Access Control Lists, Active Directory Domain Services, and Azure Active Directory among others.
QiBit , divisione ICT di Gi Group S.p. A., è specializzata nella selezione, formazione, inserimento e sviluppo professionale dei profili IT per il mercato italiano.. · Definire e applicare le best practice di sicurezza per le architetture cloud e per gli ambienti Kubernetes.. · Esperienza di almeno 3 anni nel ruolo di Cloud Security Architect o posizioni equivalenti.. · Conoscenza dei principali framework e strumenti di sicurezza cloud, come Identity and Access Management, Encryption, Firewall, IDS/IPS, SIEM, ecc.. · Certificazioni di sicurezza in ambito cloud e Kubernetes, quali ad esempio Azure Security Engineer oppure Certified Kubernetes Security Specialist, costituiranno titolo preferenziale.
Cyber Incident Response Engagement Lead (Threat Actor Communications) Chicago, IL. This fully remote, non-technical, and non-managerial role is well-suited for professionals who thrive in high-stakes, fast-paced environments and are motivated to make a meaningful impact in cyber incident response.. Threat Actor Communications & Negotiation Strategy:Develop and implement negotiation tactics that align with overall incident response goals.. Experience:Relevant professional background in consulting, crisis communication, cyber insurance, legal, or similarly high-pressure, client-facing fields.. Prior experience with cyber incident response, negotiations, or threat intelligence is a plus, but not required.